Menu

stuxnet

With every new report and article coming from the establishment and alternative media about Fukushima, Japan, the gap between their fake reality and the real truth keeps growing further and has by now become so wide that it seems to be very unlikely that the establishment and alternative media will ever pick up the real facts in their reporting about the nuclear power station in Fukushima.

Obviously it can be expected that also the problems in the aftermath of the proven eco-terror, the nuclear attacks and the sabotage will be shrouded in lies and deception. Sadly, we don’t expect any other behavior.

Practically all the ongoing reports about the leaking of water, about pumps and valves that are malfunctioning or were “forgotten” to be switched properly and about the failing thermometers at the Fukushima power station are missing the same crucial piece of information.

It has already been confirmed since at least 2010 and in multiple ways that Stuxnet (malware/virus), created by the U.S. and Israel, infected and continues to sabotage the Fukushima nuclear power station by attacking the Siemens SCADA control systems.

The same Stuxnet is also responsible for sabotaging the thermometers in the nuclear reactors that continue to fail, like it is the case in unit 2, falsely blamed on workers who “cripple” the instruments. Thermometers like in Fukushima are operated through/linked to the SCADA control systems which are still infected with Stuxnet, this means that also the thermometers are exposed to the Stuxnet infection.

The decontamination system for contaminated water at Fukushima was co-developed by AREVA and Veolia Water in “a record-two months“ after the eco-terror and the nuclear attacks occurred. According to Veolia Water data their “state-of-the-art online control of wastewater systems” work with and supplement SCADA control systems:

“The operation and reporting of STAR Control® are based on Internet technology and a graphic user interface is accessed by network browser on LAN, ADSL or similar networks.”

This is surely the reason why Magna BSP’s internet connection with the reactors at Fukushima is so important to those who have created this mess by committing eco-terror and engaging in war crimes. In this way full control can be kept remotely which is necessary when Japan is to be held hostage firmly, as they slowly lose credibility in the international community for a disaster they didn’t even create.

So whenever you encounter a new Fukushima article or report be sure to check if that source has already reported about the real facts, including the eco-terror, the nuclear attacks and the sabotage. If they haven’t done so then it’s very unlikely that their future reporting will be trustworthy since they omit key facts on purpose and leave you in fear with fake radiation charts to stare at.

Stuxnet, a computer virus designed to attack servers isolated from the Internet, such as at power plants, has been confirmed on 63 personal computers in Japan since July, according to major security firm Symantec Corp.

The virus does not cause any damage online, but once it enters an industrial system, it can send a certain program out of control.

Symantec says the virus reaches the servers via USB memory sticks, and warns against the careless use of such devices.

Systems at power plants, gas stations and water facilities are not connected to the Internet to protect them from cyber-attacks.

A Symantec engineer who has analyzed the virus said it was made using advanced technology, and it is highly likely a well-funded organization, not an individual, produced it. The virus has spread throughout the globe via the Internet.

After Stuxnet finds its way onto an ordinary computer via the Internet, it hides there, waiting for a USB memory stick to be connected to the computer, when it transfers itself to the memory stick. When the USB device is then connected to a computer linked to an isolated server, it can enter the system and take control of it.

As computers that harbor Stuxnet do not operate strangely, the virus can be transferred to a memory stick inadvertently.

According to the security company, the virus is designed to target a German-made program often used in systems managing water, gas and oil pipelines. The program is used at public utilities around the world, including in Japan.

The virus could cause such systems to act erratically, and it could take months to restore them to normal.

The 63 infected computers found in Japan were likely infected sometime after June.

According to the company, about 60 percent of the computers that have been infected with the virus were discovered in Iran. Since September, about 30,000 computers there have been found to be infected with the virus. The country’s Industry and Mines Ministry has called the virus an electronic act of war.

Some computers at the Iranian Bushehr nuclear power plant, which is scheduled to begin operation in October, have been infected with the virus.

A supervisor at the plant said the virus has not damaged the facility’s main computer system and would not affect its planned opening.

In Japan, no public utilities have been affected by the virus. Nevertheless, the Cabinet Office’s National Information Security Center has urged electric power companies to exercise extreme care when using USB devices, and to scan any programs that may have been tampered with.